Security Requirements Engineering (SRE) Framework for Cyber-Physical Systems (CPS): SRE for CPS

被引:5
作者
ur Rehman, Shafiq [1 ]
Gruhn, Volker [1 ]
机构
[1] Univ Duisburg Essen, Inst Software Technol, D-45127 Essen, Germany
来源
NEW TRENDS IN INTELLIGENT SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES | 2017年 / 297卷
关键词
Security; security requirements; security requirements engineering; cyber-physical systems; framework; methodology; TROPOS;
D O I
10.3233/978-1-61499-800-6-153
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security is an important feature of the software. Integrating security requirements right at the beginning not only ensure secure software but also save a lot of precious time and reduce the effort of rework of software development team. However, to build a secure system is not an easy task and it is extremely difficult to develop a secure system, especially in the case of cyber-physical systems (CPS). In this paper, we propose a security requirements engineering framework that provides ways to determine security requirements throughout the requirements engineering phase which consists of a number of activities to elicit and finalize the security requirements for CPS. Additionally, we determine the activities that need to be implemented in the security requirements engineering framework to address security requirements for CPS. We compare our proposed security requirements engineering framework with other existing software security frameworks. The result shows that not all software security frameworks perform all the basic and important activities in the development of secure software systems. This may also result in a development of an unsecure cyber-physical systems. Furthermore, this comparison survey helps us to identify the short-comings in SRE frameworks which has been rectified in our proposed security requirements engineering framework for CPS.
引用
收藏
页码:153 / 163
页数:11
相关论文
共 50 条
[11]   Modeling Cyber-Physical Systems [J].
Derler, Patricia ;
Lee, Edward A. ;
Vincentelli, Alberto Sangiovanni .
PROCEEDINGS OF THE IEEE, 2012, 100 (01) :13-28
[12]   Systems engineering framework for cyber physical security and resilience [J].
DiMase D. ;
Collier Z.A. ;
Heffner K. ;
Linkov I. .
Environment Systems and Decisions, 2015, 35 (2) :291-300
[13]   A comparison of security requirements engineering methods [J].
Fabian, Benjamin ;
Guerses, Seda ;
Heisel, Maritta ;
Santen, Thomas ;
Schmidt, Holger .
REQUIREMENTS ENGINEERING, 2010, 15 (01) :7-40
[14]  
Gopal T, 2014, 2014 FOURTH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), P103, DOI 10.1109/INTECH.2014.6927744
[15]   Internet of Things (IoT): A vision, architectural elements, and future directions [J].
Gubbi, Jayavardhana ;
Buyya, Rajkumar ;
Marusic, Slaven ;
Palaniswami, Marimuthu .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07) :1645-1660
[16]   Security requirements engineering: A framework for representation and analysis [J].
Haley, Charles B. ;
Laney, Robin ;
Moffett, Jonathan D. ;
Nuseibeh, Bashar .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2008, 34 (01) :133-153
[17]  
Hochreiner C, 2014, LECT NOTES COMPUT SC, V8407, P419, DOI 10.1007/978-3-642-55032-4_42
[18]  
Jurjens J., 2002, UML 2002 The Unified Modeling Language, V2460, P1
[19]  
Jurjens J., 2005, Secure systems development with UML
[20]  
Khan Muhammad Umair Ahmed, 2009, 2009 33rd Annual IEEE International Computer Software and Applications Conference (COMPSAC 2009), P353, DOI 10.1109/COMPSAC.2009.206